Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-39498 | ESXI5-VM-000044 | SV-51356r1_rule | Medium |
Description |
---|
The VM console enables a connection to the console of a virtual machine, in effect seeing what a monitor on a physical server would show. The VM console also provides power management and removable device connectivity controls, which might potentially allow a malicious user to bring down a virtual machine. In addition, it also has a performance impact on the service console, especially if many VM console sessions are open simultaneously. |
STIG | Date |
---|---|
VMware ESXi Version 5 Virtual Machine Security Technical Implementation Guide | 2015-12-03 |
Check Text ( C-46758r1_chk ) |
---|
Remote management services, such as terminal services and SSH, must be used to interact with virtual machines. VM console access should only be granted when remote management services are unavailable or insufficient to perform necessary management tasks. Ask the SA if a VM console is used to perform VM management tasks, other than for troubleshooting (non-management) VM performance issues. If a VM console is used to perform VM management tasks, other than for troubleshooting (non-management) VM performance issues, this is a finding. If SSH and/or terminal management services are exclusively used to perform management tasks, this is not a finding. |
Fix Text (F-44510r1_fix) |
---|
Develop a policy prohibiting the use of a VM console for performing management services. This policy should include procedures for the use of SSH and Terminal Management services for VM management. Where SSH and Terminal Management services prove insufficient to troubleshoot a VM, access to the VM console may be temporarily granted for simultaneous. |